12 research outputs found

    Macrocell Protection Interference Alignment in Two-Tier Downlink Heterogeneous Networks

    Get PDF
    Conventional interference alignment (IA) has been developed to mitigate interference problems for the coexistence of picocells and macrocells. This paper proposes a macrocell protection interference alignment (MCP-IA) in two-tier MIMO downlink heterogeneous networks. The proposed method aligns the interference of the macro user equipment (UE) and mitigates the interference of the pico-UEs with a minimum mean squared error interference rejection combining (MMSE-IRC) receiver. Compared to the conventional IA, the proposed MCP-IA provides an additional array gain obtained by the precoder design of the macro BS and a diversity gain achieved by signal space selections. The degrees of freedom (DoF) of the proposed MCP-IA are equal to or greater than that of the conventional IA and are derived theoretically. Link level simulations show the link capacity and the DoF of the macro UE, and also exhibit the proposed MCP-IA attaining additional array gain and diversity gain. The system level simulation illustrates that the proposed method prevents the interference of the macro UE completely and preserves the throughput of the pico-UE irrespective of the number of picocells. For 4 × 2 antenna configuration, the system level simulation demonstrates that the proposed MCP-IA throughput of the macro UE is not affected by the number of picocells and that the proposed MCP-IA throughput of the picocells approaches that of single-user MIMO (SU-MIMO) with a 3% loss

    Relay Selection for Capacity Increase in Underwater Acoustic Sensor Network

    No full text
    In long distance sensor nodes, propagation delay is the most crucial factor for the successful transmission of data packets in underwater acoustic sensors networks (UWAs). Therefore, to cope with the problem of propagation delay, we propose examining and selecting the best relay node (EBRN) technique based on checking the eligibility and compatibility of RN and selecting the best RN for UWAs. In the EBRN technique, the source node (S) creates a list of the best RNs, based on the minimum propagation delay to the midpoint of a direct link between S and the destination node (D). After that, the S attaches the list of selected RNs and transmit to the D along with data packets. Finally, from the list of selected RNs, the process of retransmission is performed. To avoid collision among control packets, we use a backoff timer that is calculated from the received signal strength indicator (RSSI), propagation delay and transmission time, whereas the collision among data packets is avoided by involving single RN in a particular time. The performance of the proposed EBRN technique is analyzed and evaluated based on throughput, packet loss rate (LR), packet delivery ratio (PDR), energy efficiency, and latency. The simulation results validate the effectiveness of the proposed EBRN technique. Compared with the existing schemes such as underwater cooperative medium access control (UCMAC) and shortest path first (SPF), the proposed EBRN technique performs remarkably well by increasing the throughput, PDR, and energy efficiency while decreasing the latency and LR in UWAs

    Antijamming Improvement for Frequency Hopping Using Noise-Jammer Power Estimator

    No full text
    In frequency-hopping spread-spectrum (FHSS) systems, jammer detection and mitigation are important but difficult. Each slot of the FHSS experiences frequency-selective fading and unequal transceiver-frequency gains that hinder the detection of jammed slots and result in a poor bit-error rate (BER). To increase BER performance, we first propose a noise-jammer power estimator (NJPE) that estimates noise and jammer powers regardless of different channel gains, and derived its normalized Cramér–Rao bound (NCRB). Second, we developed a jammer detector based on gamma distribution, and designed a restoration method combining all nonjammed slots. Computer simulations verified the derived NCRB of the proposed NJPE by normalized mean squared error (NMSE), and showed that the jammer-detection probability of the proposed jammer detector was better than that of conventional detectors. The BER performance of the proposed method was also shown to be better than that of conventional methods

    Deep learning-based Direction-of-arrival estimation for far-field sources under correlated near-field interferences

    No full text
    This paper proposes a deep learning-based Direction-of-arrival (DOA) estimation to detect interfered far-field sources. The proposed method consists of a near-field interference rejection network (NFIRnet) and a DOA estimation network (DOAnet). The NFIRnet calculates the near-field components of the covariance matrix by convolutional neural networks with the proposed complex mapper. The near-field components are rejected from the covariance matrix. The DOAnet removes the residuals of the interferences by the proposed self-spatial attention network and estimates the DOAs of the interfered far-field sources. Computer simulations demonstrated that the proposed method had better DOA estimation performance than the conventional methods

    Macrocell Protection Interference Alignment in Two-Tier Downlink Heterogeneous Networks

    No full text
    Conventional interference alignment (IA) has been developed to mitigate interference problems for the coexistence of picocells and macrocells. This paper proposes a macrocell protection interference alignment (MCP-IA) in two-tier MIMO downlink heterogeneous networks. The proposed method aligns the interference of the macro user equipment (UE) and mitigates the interference of the pico-UEs with a minimum mean squared error interference rejection combining (MMSE-IRC) receiver. Compared to the conventional IA, the proposed MCP-IA provides an additional array gain obtained by the precoder design of the macro BS and a diversity gain achieved by signal space selections. The degrees of freedom (DoF) of the proposed MCP-IA are equal to or greater than that of the conventional IA and are derived theoretically. Link level simulations show the link capacity and the DoF of the macro UE, and also exhibit the proposed MCP-IA attaining additional array gain and diversity gain. The system level simulation illustrates that the proposed method prevents the interference of the macro UE completely and preserves the throughput of the pico-UE irrespective of the number of picocells. For 4×2 antenna configuration, the system level simulation demonstrates that the proposed MCP-IA throughput of the macro UE is not affected by the number of picocells and that the proposed MCP-IA throughput of the picocells approaches that of single-user MIMO (SU-MIMO) with a 3% loss

    Biomimicking Covert Communication by Time-Frequency Shift Modulation for Increasing Mimicking and BER Performances

    No full text
    Underwater acoustic (UWA) biomimicking communications have been developed for covert communications. For the UWA covert communications, it is difficult to achieve the bit error rate (BER) and the degree of mimic (DoM) performances at the same time. This paper proposes a biomimicking covert communication method to increase both BER and DoM (degree of mimic) performances based on the Time Frequency Shift Keying (TFSK). To increase DoM and BER performances, the orthogonality requirements of the time- and frequency-shifting units of the TFSK are theoretically derived, and the whistles are multiplied by the sequence with a large correlation. Two-step DoM assessments are also developed for the long-term whistle signals. Computer simulations and practical lake and ocean experiments demonstrate that the proposed method increases the DoM by 35% and attains a zero BER at −6 dB of Signal to Noise Ratio (SNR)

    Machine Learning Based Biomimetic Underwater Covert Acoustic Communication Method Using Dolphin Whistle Contours

    No full text
    For underwater acoustic covert communications, biomimetic covert communications have been developed using dolphin whistles. The conventional biomimetic covert communication methods transmit slightly different signal patterns from real dolphin whistles, which results in a low degree of mimic (DoM). In this paper, we propose a novel biomimetic communication method that preserves the large DoM with a low bit error rate (BER). For the transmission, the proposed method utilizes the various contours of real dolphin whistles with the link information among consecutive whistles, and the proposed receiver uses machine learning based whistle detectors with the aid of the link information. Computer simulations and practical ocean experiments were executed to demonstrate the better BER performance of the proposed method. Ocean experiments demonstrate that the BER of the proposed method was 0.002, while the BER of the conventional Deep Neural Network (DNN) based detector showed 0.36

    Differential space time block codes using nonconstant modulus constellations

    No full text

    Toward Quantum Secured Distributed Energy Resources: Adoption of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD)

    No full text
    Quantum computing is a game-changing technology that affects modern cryptography and security systems including distributed energy resources (DERs) systems. Since the new quantum era is coming soon in 5–10 years, it is crucial to prepare and develop quantum-safe DER systems. This paper provides a comprehensive review of vulnerabilities caused by quantum computing attacks, potential defense strategies, and remaining challenges for DER networks. First, new security vulnerabilities and attack models of the cyber-physical DER systems caused by quantum computing attacks are explored. Moreover, this paper introduces potential quantum attack defense strategies including Quantum Key Distribution (QKD) and Post-Quantum Cryptography (PQC), which can be applied to DER networks and evaluates defense strategies. Finally, remaining research opportunities and challenges for next-generation quantum-safe DER are discussed
    corecore